Book description
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.
Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.
This book will help you:
- Plan and design incident response, disaster recovery, compliance, and physical security
- Learn and apply basic penetration-testing concepts through purple teaming
- Conduct vulnerability management using automated processes and tools
- Use IDS, IPS, SOC, logging, and monitoring
- Bolster Microsoft and Unix systems, network infrastructure, and password management
- Use segmentation practices and designs to compartmentalize your network
- Reduce exploitable errors by developing code securely
Publisher resources
Table of contents
- Foreword to the First Edition
- Preface
- 1. Creating a Security Program
- 2. Asset Management and Documentation
- 3. Policies
- 4. Standards and Procedures
- 5. User Education
- 6. Incident Response
- 7. Disaster Recovery
- 8. Industry Compliance Standards and Frameworks
- 9. Physical Security
- 10. Microsoft Windows Infrastructure
- 11. Unix Application Servers
- 12. Endpoints
- 13. Databases
- 14. Cloud Infrastructure
- 15. Authentication
- 16. Secure Network Infrastructure
- 17. Segmentation
- 18. Vulnerability Management
- 19. Development
- 20. OSINT and Purple Teaming
- 21. Understanding IDSs and IPSs
- 22. Logging and Monitoring
- 23. The Extra Mile
-
Appendix. User Education Templates
-
Live Phishing Education Slides
- You’ve Been Hacked!
- What Just Happened, and Why?
- Social Engineering 101(0101)
- So It’s OK That You Were Exploited (This Time)
- No Blame, No Shames, Just...
- A Few Strategies for Next Time
- Because There Will Be a Next Time
- If Something Feels Funny
- If Something Looks Funny
- If Something Sounds Funny
- Feels, Looks, or Sounds Funny—Call the IT Help Desk
- What If I Already Clicked the Link or Opened the Attachment?
- What If I Didn’t Click the Link or Attachment?
- Your IT Team Is Here for You!
- Phishing Program Rules
-
Live Phishing Education Slides
- Index
- About the Authors
Product information
- Title: Defensive Security Handbook, 2nd Edition
- Author(s):
- Release date: June 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098127244
You might also like
book
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have …
book
Mastering Defensive Security
An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …
book
Fundamentals of Information Systems Security, 4th Edition
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers …